A Survey on Cloud Computing with different Encryption Techniques to Secure Cloud Data

Authors

  • Prajapati K Department of Computer Sscience, MANIT Bhopal, MP, India
  • Choudhary J Department of Computer Sscience, MANIT Bhopal, MP, India

Keywords:

Component Cloud computing security, Obstacles in cloud, Attribute based encryption, Homomorphic encryption

Abstract

Cloud provides facility of assigning data to a great number of scattered computers, rather than local computer or remote server. This paper briefly surveys the issues in cloud computing security. The fact is that the data shared with the cloud service provider is identified as the core scientific problem that separates cloud computing security from other topics in
computing environment. The paper also describes different encryption techniques to secure the cloud data from unauthorized
users.

References

Huth and J. Cebula, “The Basics of Cloud Computing,” Carnegie Mellon University. pp. 1–4, 2011 [Online].

S. Marston, Z. Li, S. Bandyopadhyay, J.Zhang, and A. Ghalsasi, “Cloud computing the business perspective,” Decis. Support Syst.,vol. 51, no. 1, pp. 176–189, Apr. 2011.

P. Mell, T. Grance, and T. Grance, “The NIST

Definition of Cloud Computing” Recommendations of the National Institute Of Standards and Technology, pp. 800-145, September 2011.

P. G. Dorey and a. Leite, “Commentary: Cloud computing – A security problem or solution?”Inf. Secur. Tech. Rep., vol. 16,no. 3–4, pp. 89–96, Aug. 2011.

M. Armbrust, A. D. Joseph, R. H. Katz, and D. A. Patterson, “Above the Clouds: A Berkeley View of Cloud Computing,” University of California at Berkeley pp. 14- 19, February 10, 2009.

B. J. Brodkin, N. W. Cloud, S. Risks, C. Computing, and G.

A. Engine, “Gartner: Seven cloud-computing security risks,” pp. 2–3, 2008.

C. Lee, P. Chung, and M. Hwang, “A Survey on Attribute- based Encryption Schemes of Access Control in Cloud Environments,” vol. 15, no. 4, pp. 231–240, 2013.

N. York, “Securing the cloud with homomorphic encryption,” vol. 20, no. 3, pp. 1–4, 2014.

M. Tibouchi, “Fully Homomorphic Encryption over the Integers: From Theory to Practice,” pp. 1–4, 2014.

A. Atayero and O. Feyisetan, “Security Issues in Cloud Computing : The Potentials of Homomorphic Encryption,” vol. 2, no. 10, pp. 546–552, 2011.

M. Tebaa, S. E. L. Hajji, and A. E. L. Ghazi,“Homomorphic Encryption Applied to the Cloud Computing Security,” vol. 1, pp. 8–11, 2012.

Downloads

Published

2015-05-30

How to Cite

[1]
K. Prajapati and J. choudhary, “A Survey on Cloud Computing with different Encryption Techniques to Secure Cloud Data”, Int. J. Comp. Sci. Eng., vol. 3, no. 5, pp. 1–6, May 2015.

Issue

Section

Survey Article